计算机科学 ›› 2020, Vol. 47 ›› Issue (2): 276-280.doi: 10.11896/jsjkx.190100051

• 信息安全 • 上一篇    下一篇

基于快速置换和可选择像素扩散的医疗图像加密算法的安全性分析

禹峰,龚馨慧,王世红   

  1. (北京邮电大学理学院 北京100876)
  • 收稿日期:2019-01-07 出版日期:2020-02-15 发布日期:2020-03-18
  • 通讯作者: 王世红(shwang@bupt.edu.cn)

Cryptanalysis of Medical Image Encryption Algorithm Using High-speed Scrambling and Pixel Adaptive Diffusion

YU Feng,GONG Xin-hui,WANG Shi-hong   

  1. (School of Science,Beijing University of Posts and Telecommunications,Beijing 100876,China)
  • Received:2019-01-07 Online:2020-02-15 Published:2020-03-18
  • About author:YU Feng,born in 1993,postgraduate.His main research interests include chaotic encryption;WANG Shi-hong,born in 1966,Ph.D,professor.Her main research interests include chaotic encryption.

摘要: 图像加密算法的安全性是最基本和最重要的。医疗图像加密是保护患者隐私的一种手段,分析医疗图像加密算法的安全性,对设计医疗图像加密算法、增强算法的安全性和促进医疗图像加密算法的应用非具有常重要的意义。最近,Hua等提出了一种基于快速置换和可选择像素扩散的医疗图像加密方案。加密方案的一个关键操作是在图像的四周插入随机值,然后通过置乱使得随机值分散到整幅图像,最后通过扩散混乱等操作加密整幅图像。每次加密都会产生不同的随机值,即使加密相同的图像,每次加密得到的密文也不一样,这就保证了“一次一密”的加密效果。文中采用差分分析和选择密文攻击,从理论上详细地分析了Hua等提出的算法。首先分析解密过程,通过差分分析构造明文-密文的线性关系,并根据构造的线性关系建立密码本;然后使用密码本攻击便可破解该算法。密码本的大小与图像尺寸相关,若密文图像的尺寸为M×N,则构造的密码本包含(M×N+1)个明文-密文对。仿真实验验证了理论分析的正确性。为了提高该算法的安全性,抵抗文中提出的密码本攻击,进一步提出了一种基于差分分析的改进方案。该方案引入了与明文相关的置换矩阵。仿真实验结果和统计分析结果表明,改进方案不仅继承了原算法的优点,而且具有很好的抗差分攻击能力。

关键词: 差分分析, 混沌加密, 密码本攻击, 图像加密, 医疗图像

Abstract: Security is essential and important for every image encryption algorithm.Medical image encryption is a means to protect patients’ privacy.Analyzing the security of medical image encryption algorithm is very meaningful for the design of medical image encryption algorithm,enhancing the security of algorithm and promoting the application of medical image encryption algorithm.Recently,Hua et al.proposed a medical image encryption algorithm using high-speed scrambling and pixel adaptive diffusion.The key operation of the scheme is insertion of a random sequence around an image,then the random values are dispersed to the whole image by scrambling,finally,the whole image is scrambled by diffusion.Because different random values are generated in each encryption,even for one unchanged image,the cipher-image is different in every encryption such that Hua et al’s scheme is similar to one time one pad system.In this paper,the security of the algorithm was analyzed by differential cryptanalysis and chosen ciphertext attack in detail.The decryption process is analyzed theoretically by differential cryptanalysis and linear relationship is constructed between plain-images and cipher-images.Based on the linear relationship,a codebook is established,and the codebook attack breaks Hua et al’s algorithm.The size of the codebook is determined by the size of the cipher-image.If the size of the cipher-image is,the constructed codebook contains pairs of plain-image/cipher-image.The experimental results verify the theoretical analysis.To improve the security of Hua et al’s algorithm and to resist the differential cryptanalysis,an improved scheme was proposed.In the improved scheme,plaintext-related permutation matrices are introduced.The simulation and statistical results show that the improved scheme not only inherits the advantages of the original algorithm,but also resist the differentialcryptanalysis and the codebook attack.

Key words: Chaotic encryption, Codebook attack, Differential cryptanalysis, Image encryption, Medical image

中图分类号: 

  • TP391
[1]ROBERT A M.On the derivation of a “chaotic” encryption algorithm[J].Cryptologia,1989,13(1):29-42.
[2]FRIDRICH J.Image encryption based on chaotic maps[C]∥ IEEE International Conference on Systems.IEEE,1997.
[3]CHAI X,ZHENG X,GAN Z,et al.An image encryption algorithm based on chaotic system and compressive sensing[J].Signal Processing,2018,148:124-144.
[4]CHEN J,ZHU Z L,ZHANG L B,et al.Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption[J].Signal Processing,2018,142:340-353.
[5]ZHANG L Y,LIU Y,WONG K W,et al.On the security of a class of diffusion mechanisms for image encryption[J].IEEE Transactions on Cybernetics,2017,PP(99):1-13.
[6]QIWEN R,LING W,JING M,et al.A quantum color image encryption scheme based on coupled hyper-chaotic Lorenz system with three impulse injections[J].Quantum Information Proces-sing,2018,17(8):188.
[7]CAO C,SUN K,LIU W.A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map[J].Signal Processing,2017,143:122-133.
[8]CHEN J,ZHU Z L,ZHANG L B,et al.Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption[J].Signal Processing,2018,142:340-353.
[9]LI S,LI C,CHEN G,et al.A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks[J].Signal Processing:Image Communication,2008,23(3):212-223.
[10]LI C Q,LIU Y S,XIE T,et al.Breaking a novel image encryption scheme based on improved hyperchaotic sequences[J].Nonlinear Dynamics,2013,73(3):2083-2089.
[11]SOLAK E,COKAL C,YILDID O T,et al.Cryptanalysis of fridrich’s chaotic image encryption[J].International Journal of Bifurcation & Chaos,2010,20:1405-1413.
[12]FU C,MENG W,ZHAN Y,et al.An efficient and secure medical image protection scheme based on chaotic maps[J].Compu-ters in Biology & Medicine,2013,43(8):1000-1010.
[13]ZHOU G,ZHANG D,LIU Y,et al.A novel image encryption algorithm based on chaos and Line map[J].Neurocomputing,2015,169:150-157.
[14]CHEN L,WANG S H.Differential cryptanalysis of a medical image cryptosystem with multiple rounds[M].British:Pergamon Press,2015.
[15]CHEN L,MA B,ZHAO X,et al.Differential cryptanalysis of a novel image encryption algorithm based on chaos and Line map[J].Nonlinear Dynamics,2016,87(3):1-11.
[16]HUA Z Y,YI S,ZHOU Y C.Medical image encryption using high-speed scrambling and pixel adaptive diffusion[J].Signal Processing,2017,144:134-144.
[17]RUKHIN A L,SOTO J,NECHVATAL J R,et al.SP 800-22 Rev.1a.A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications[J].Applied Physics Letters,2010,22(7):1645-1796.
[18]PARESCHI F,ROVATTI R,SETTI G.On Statistical Tests for Randomness Included in the NIST SP800-22 Test Suite and Based on the Binomial Distribution[J].IEEE Transactions on Information Forensics and Security,2012,7(2):491-505.
[1] 周连兵, 周湘贞, 崔学荣.
基于双重二维混沌映射的压缩图像加密方案
Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map
计算机科学, 2022, 49(8): 344-349. https://doi.org/10.11896/jsjkx.210700235
[2] 张赛男, 李千目.
一种基于Logistic-Sine-Cosine映射的彩色图像加密算法
Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping
计算机科学, 2022, 49(1): 353-358. https://doi.org/10.11896/jsjkx.201000041
[3] 沈璇, 王欣玫, 何俊, 孙志远.
PFP算法改进的不可能差分分析
Revised Impossible Differential Cryptanalysis of PFP Block Cipher
计算机科学, 2020, 47(7): 263-267. https://doi.org/10.11896/jsjkx.200200034
[4] 班多晗, 吕鑫, 王鑫元.
基于一维混沌映射的高效图像加密算法
Efficient Image Encryption Algorithm Based on 1D Chaotic Map
计算机科学, 2020, 47(4): 278-284. https://doi.org/10.11896/jsjkx.190600059
[5] 韩羽, 张文政, 董新锋.
基于线性划分的陷门S盒的设计与分析
Design and Analysis of Trapdoor S-Box Based on Linear Partition
计算机科学, 2020, 47(11A): 368-372. https://doi.org/10.11896/jsjkx.191200036
[6] 田军锋, 彭静静, 左宪禹, 葛强, 范明虎.
基于循环移位和多混沌映射的图像加密算法
Image Encryption Algorithm Based on Cyclic Shift and Multiple Chaotic Maps
计算机科学, 2020, 47(10): 327-331. https://doi.org/10.11896/jsjkx.190800003
[7] 王丽娟, 李国东, 吕冬梅.
基于动态参数控制的混沌系统图像加密算法
Chaotic System Image Encryption Algorithm Based on Dynamic Parameter Control
计算机科学, 2019, 46(11A): 469-472.
[8] 韩雪娟, 李国东, 王思秀.
基于Logistic和超混沌结合的加密算法
Cryptographic Algorithm Based on Combination of Logistic and Hyperchaos
计算机科学, 2019, 46(11A): 477-482.
[9] 赵方正, 李成海, 刘晨, 宋亚飞.
超混沌彩色图像加密算法优化及安全性分析
Security Analysis and Optimization of Hyper-chaotic Color Image Encryption Algorithm
计算机科学, 2019, 46(11A): 483-487.
[10] 朱淑芹,王文宏,李俊青.
针对基于感知器模型的混沌图像加密算法的选择明文攻击
Chosen Plaintext Attack on Chaotic Image Encryption Algorithm Based on Perceptron Model
计算机科学, 2018, 45(4): 178-181. https://doi.org/10.11896/j.issn.1002-137X.2018.04.030
[11] 汪乐乐, 李国东.
基于游程性序列的双重混沌的图像加密算法
Double Chaotic Image Encryption Algorithm Based on Run-length Sequence
计算机科学, 2018, 45(11A): 361-366.
[12] 臧睿, 于洋.
基于对合矩阵的复合图像加密算法
Composite Image Encryption Algorithm Based on Involutory Matrix
计算机科学, 2018, 45(11A): 389-392.
[13] 汪乐乐, 李国东.
基于分数阶Fourier的双混沌加密算法
Double Chaotic Image Encryption Algorithm Based on Fractional Transform
计算机科学, 2018, 45(11A): 393-397.
[14] 朱淑芹,李俊青.
参数扰动下的混沌的图像加密方案
Image Encryption Scheme Based on Chaos with Parameter Perturbation
计算机科学, 2017, 44(Z6): 356-360. https://doi.org/10.11896/j.issn.1002-137X.2017.6A.081
[15] 朱淑芹,王文宏,孙忠贵.
对一种基于比特置乱的超混沌图像加密算法的选择明文攻击
Chosen Plaintext Attack on Image Encryption Algorithm Based on Bit Scrambling and Hyperchaos
计算机科学, 2017, 44(11): 273-278. https://doi.org/10.11896/j.issn.1002-137X.2017.11.041
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!